Hackers Exposed Military and Government AccountsAdded: Wednesday, July 13th, 2011
Category: Bit Torrent Freedom > The Right To Share
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extrattorrent.com
Operation AntiSec is on its way, with more and more government services being compromised. Once again, nearly 17,000 e-mail accounts have been dumped to one of the file-sharing services a while ago. It appeared that the 1.18MB text file was posted by Connexion Hack Team, exposing government and military e-mail addresses and passwords. In addition, lots of popular e-mail providers can also be found in the list of leaked accounts.
It was just a few days ago that Connexion had dumped information from a California government online service. Apparently, now they’ve made another information dump. The Connexion Hack Team released a statement, saying that the emails and passwords were random, and refused to say which website they had come from. Those who suspect their emails to be contained in the list, are encouraged to check it by search, and if it is, to pick another address.
In fact, there are lots of government e-mails from everywhere, including e-mails from the NSA, Virginia, the DHS, and so on. To some of the users’ credit, they did have passwords containing a combination of letters, numbers and symbols, but there were not many of those. The most funny password was “changeme”, which the hackers commented “mega lulz”.
As for the military accounts, there were also a few of them containing a combination of symbols, which meant to take much longer to crack such a password. These were perhaps obtained in another way in this case.
Meanwhile, the rest of e-mails and passwords are all over the map, published in alphabetical order which, strangely enough, end on the letter “s”. It isn’t clear whether there’ll be a second dump or anything after the letter “s” is quite safe for now. Exposed domains include a lot of Yahoo and Spartans.nsu, as well as AOL, Gmail, Hotmail, MSN, BellSouth, Earthlink, Comcast, Sprint.Blackberry, vzpix, sbcglobal, Cox, Verizon, NSU, and many more.
It’s quite hard to know for sure how all of those emails were obtained, if you take into consideration that it was just a random smattering of addresses. Undoubtedly, such accounts will emerge somewhere else for people wondering if their accounts were exposed. Meanwhile, those who want to know it right now are free to download the whole list from MediaFire while it’s still up.
July 13th,2011Posted by:
Wednesday, July 13th, 2011
|posted by (2011-07-13 16:36:17)|
|Can I post the mediafire link to this file here or would that be a rule breach?|
|posted by (2011-07-13 17:07:53)|
|good job for hackers|
kepp it in this way!!
|posted by (2011-07-13 17:08:49)|
|porta give me the link in prv|
|posted by (2011-07-13 22:33:10)|
|Anonymous stealing military addresses ect its never gonna end|
|lol, to funny|
|posted by (2011-07-14 07:35:12)|
|Porta could you send me the link to please|
|posted by (2011-07-15 05:14:19)|
|pls send me the link||
Most Popular Stories